{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:08Z","timestamp":1750306208635,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,11,13]],"date-time":"2016-11-13T00:00:00Z","timestamp":1478995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,11,13]]},"DOI":"10.1145\/2988272.2990297","type":"proceedings-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T19:39:50Z","timestamp":1478288390000},"page":"47-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["A Distributed and Adaptive Trust Evaluation Algorithm for MANET"],"prefix":"10.1145","author":[{"given":"Dexin","family":"Zhao","sequence":"first","affiliation":[{"name":"TJUT, Tianjin, China"}]},{"given":"Zhen","family":"Ma","sequence":"additional","affiliation":[{"name":"TJUT, Tianjin, China"}]},{"given":"Degan","family":"Zhang","sequence":"additional","affiliation":[{"name":"TJUT, Tianjin, China"}]}],"member":"320","published-online":{"date-parts":[[2016,11,13]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1109\/TII.2013.2250910"},{"doi-asserted-by":"crossref","unstructured":"Zhang D. G. & Kang X. J. 2012.A novel image de-noising metod based on spherical coordinates system EURASIP Journal on Advances in Signal Processing. 1--10.  Zhang D. G. & Kang X. J. 2012.A novel image de-noising metod based on spherical coordinates system EURASIP Journal on Advances in Signal Processing. 1--10.","key":"e_1_3_2_1_2_1","DOI":"10.1186\/1687-6180-2012-110"},{"doi-asserted-by":"crossref","unstructured":"Zhang D. G. Wang X. & Song X. D. 2014. A novel Approach to Mapped Correlation of ID for RFID Anticollision.IEEE Transactions on Services Computing.vol 7 no. 22 741--748.  Zhang D. G. Wang X. & Song X. D. 2014. A novel Approach to Mapped Correlation of ID for RFID Anticollision.IEEE Transactions on Services Computing.vol 7 no. 22 741--748.","key":"e_1_3_2_1_3_1","DOI":"10.1109\/TSC.2014.2370642"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1016\/j.adhoc.2015.03.004"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1080\/17517575.2011.626872"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1007\/s10489-010-0245-0"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1016\/j.camwa.2012.03.023"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.1016\/j.mcm.2012.06.012"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1016\/j.compeleceng.2012.02.016"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1109\/TSC.2010.56"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/s00500-014-1366-x"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1108\/EC-03-2015-0050"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/s11276-015-0968-2"},{"issue":"162","key":"e_1_3_2_1_14_1","first-page":"1","article-title":". New Clustering Routing Method Based on PECE for WSN.","volume":"2015","author":"Degan Zhang","year":"2015","journal-title":"EURASIP Journal on Wireless Communication and Networking"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1016\/j.comcom.2007.04.008"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/11734727_7"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1007\/s11276-009-0182-1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.3724\/SP.J.1001.2009.03300"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1016\/j.jnca.2011.03.016"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_20_1","DOI":"10.1145\/1066100.1066103"},{"volume-title":"Proc.of the 4th European wireless. 128--134","year":"2007","author":"Bettstetter C.","key":"e_1_3_2_1_21_1"},{"doi-asserted-by":"crossref","unstructured":"Soufiana Mekouar Khalil Ibrahimi. 2014. Inferring trust relationship in the social network: Evidence theory approach.IEEE IWCMC.vol.83 no.11 470--475 .  Soufiana Mekouar Khalil Ibrahimi. 2014. Inferring trust relationship in the social network: Evidence theory approach.IEEE IWCMC.vol.83 no.11 470--475 .","key":"e_1_3_2_1_22_1","DOI":"10.1109\/IWCMC.2014.6906402"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.3390\/s110201345"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TPDS.2014.2320505"}],"event":{"sponsor":["SIGSIM ACM Special Interest Group on Simulation and Modeling"],"acronym":"MSWiM '16","name":"MSWiM '16: 19th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems","location":"Malta Malta"},"container-title":["Proceedings of the 12th ACM Symposium on QoS and Security for Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2990297","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988272.2990297","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:36Z","timestamp":1750218636000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988272.2990297"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,13]]},"references-count":24,"alternative-id":["10.1145\/2988272.2990297","10.1145\/2988272"],"URL":"https:\/\/doi.org\/10.1145\/2988272.2990297","relation":{},"subject":[],"published":{"date-parts":[[2016,11,13]]},"assertion":[{"value":"2016-11-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}